Skip to main content

Wormholes No More? Localized Wormhole Detection and Prevention in Wireless Networks

  • Conference paper
Distributed Computing in Sensor Systems (DCOSS 2010)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 6131))

Included in the following conference series:

Abstract

A number of protocols have been proposed to date to defend against wormhole attacks in wireless networks by adopting synchronized clocks, positioning devices, or directional antennas. In this work, we introduce a novel approach for detecting wormhole attacks. The proposed algorithm is completely localized and works by looking for simple evidence that no attack is taking place, using only connectivity information as implied by the underlying communication graph, and total absence of coordination. Unlike many existing techniques, it does not use any specialized hardware, making it extremely useful for real-world scenarios. Most importantly, however, the algorithm can always prevent wormholes, irrespective of the density of the network, while its efficiency is not affected even by frequent connectivity changes. We also provide an analytical evaluation of the algorithm’s correctness along with an implementation on real sensor devices that demonstrates its efficiency in terms of memory requirements and processing overhead.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ahmed, N., Kanhere, S.S., Jha, S.: The holes problem in wireless sensor networks: a survey. Mobile Computing and Communications Review 9(2), 4–18 (2005)

    Article  Google Scholar 

  2. Buttyán, L., Dóra, L., Vajda, I.: Statistical wormhole detection in sensor networks, pp. 128–141 (2005)

    Google Scholar 

  3. Eriksson, J., Krishnamurthy, S.V., Faloutsos, M.: Truelink: A practical countermeasure to the wormhole attack in wireless networks, pp. 75–84 (2006)

    Google Scholar 

  4. Hai, T.H., Huh, E.-N.: Detecting selective forwarding attacks in wireless sensor networks using two-hops neighbor knowledge. In: NCA 2008: Proceedings of the 2008 Seventh IEEE International Symposium on Network Computing and Applications, Washington, DC, USA, pp. 325–331. IEEE Computer Society, Los Alamitos (2008)

    Chapter  Google Scholar 

  5. Hu, Y.-C., Perrig, A., Johnson, D.B.: Wormhole attacks in wireless networks. IEEE Journal on Selected Areas in Communications 24(2), 370–380 (2006)

    Article  Google Scholar 

  6. Issa Khalil, N.B.S., Bagchi, S.: Liteworp: A lightweight countermeasure for the wormhole attack in multihop wireless networks, p. 22 (June 2005)

    Google Scholar 

  7. Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: Attacks and countermeasures. AdHoc Networks Journal 1(2-3), 293–315 (2003)

    Article  Google Scholar 

  8. Korkmaz, T.: Verifying physical presence of neighbors against replay-based attacks in wireless ad hoc networks. In: ITCC 2005: Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC 2005), Washington, DC, USA, vol. II, pp. 704–709. IEEE Computer Society, Los Alamitos (2005)

    Chapter  Google Scholar 

  9. Krontiris, I., Benenson, Z., Giannetsos, T., Freiling, F., Dimitriou, T.: Cooperative intrusion detection in wsn. In: Roedig, U., Sreenan, C.J. (eds.) EWSN 2009. LNCS, vol. 5432, pp. 263–278. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  10. Krontiris, I., Giannetsos, T., Dimitriou, T.: Launching a sinkhole attack in wireless sensor networks; the intruder side. In: SecPriWiMob 2008: First International Workshop on Security and Privacy in Wireless and Mobile Computing, Networking and Communications, Avignon, France, October 12-14 (2008)

    Google Scholar 

  11. Lehsaini, M., Guyennet, H., Feham, M.: A-coverage scheme for wireless sensor networks. In: ICWMC 2008: Proceedings of the 2008 The Fourth International Conference on Wireless and Mobile Communications, Washington, DC, USA, pp. 91–96. IEEE Computer Society, Los Alamitos (2008)

    Chapter  Google Scholar 

  12. Lehsaini, M., Guyennet, H., Feham, M.: CES: Cluster-based energy-efficient scheme for mobile wireless sensor networks. In: IFIP Conference on Wireless Sensor and Actor Networks, Ontario, Canada (July 2008)

    Google Scholar 

  13. Maheshwari, R., Gao, J., Das, S.R.: Detecting wormhole attacks in wireless networks using connectivity information. In: 26th IEEE International Conference on Computer Communications, INFOCOM 2007, pp. 107–115. IEEE, Los Alamitos (2007)

    Chapter  Google Scholar 

  14. Poovendran, R., Lazos, L.: A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks. Wireless Networks 13(1), 27–59 (2007)

    Article  Google Scholar 

  15. Capkun, S.S., Buttyan, L., Hubaux, J.-P.: Sector: secure tracking of node encounters in multi-hop wireless networks. In: SASN 2003: Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks, pp. 21–32. ACM Press, New York (2003)

    Chapter  Google Scholar 

  16. Savvides, A., Han, C.-C., Strivastava, M.B.: Dynamic fine-grained localization in ad-hoc networks of sensors. In: MobiCom 2001: Proceedings of the 7th annual international conference on Mobile computing and networking, pp. 166–179. ACM Press, New York (2001)

    Chapter  Google Scholar 

  17. Bhargava, B., Wang, W.: Visualization of wormholes in sensor networks. In: Proceedings of ACM Workshop on Wireless Security (WiSe), in conjunction with MobiCom (October 2004)

    Google Scholar 

  18. Wang, W., Bhargava, B., Lu, Y., Wu, X.: Defending against wormhole attacks in mobile ad hoc networks: Research articles. Wirel. Commun. Mob. Comput. 6(4), 483–503 (2006)

    Article  Google Scholar 

  19. Wang, W., Lu, A.: Interactive wormhole detection and evaluation. Information Visualization 6(1), 3–17 (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Dimitriou, T., Giannetsos, A. (2010). Wormholes No More? Localized Wormhole Detection and Prevention in Wireless Networks. In: Rajaraman, R., Moscibroda, T., Dunkels, A., Scaglione, A. (eds) Distributed Computing in Sensor Systems. DCOSS 2010. Lecture Notes in Computer Science, vol 6131. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-13651-1_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-13651-1_24

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-13650-4

  • Online ISBN: 978-3-642-13651-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics